Looking for someone to analyse my website , complete keyword research and advise me on the best keywords to target and implement for my jewellery (bracelet) website.
I am looking for long tail buyer intent keywords which have a reasonable level of traffic and medium to low competition.
Note - Looking for freelancers based in the US or UK.

I need a Full Visual Key for a Grow Shop brand whose name is "Panda Verde" - Green Panda - and the mascot is a panda bear.
I already have an ideas and have made hand drawings for directions, which I will send, but what I need is a professional and creative person who will be able to grab the overall idea of the brand and create the visual material

...Please submit a sample with your bid.
Extract ALCON full product information in Key Value Pair Format extracting ALL product information.
[iniciar sesión para ver URL]
Extract ALL PRODUCT DATA and the data must be captured in key-value-pair format (KVP), creating all the necessary keys to reflect ALL the attributes

I'm doing a face reveal/Chroma, and in the middle of the project my computer broke.
So I just need someone to finish for me.
It's based on the freddie wong face reveal (in his youtube channel).
It is around 7 seconds long (23,98fps) the composition.
I will provide the plates.
Will need the project ready in 3 days, after selection.

...so data is unstructured though JSON compliant. We can not assume some key/values will be there in data. I want to replace the dot symbol in key name with underscore. So it is a recursive call to the entire JSON object and find out deep down keys across all nested elements and get key name replaced with. I have Java Iterator to traverse all the items of

Research articles and facts RE: American cities: 5 topics, demographics, housing, jobs, food, healthcare 20 important articles on each subject plus a summary of key facts. See attachments for approach and how the info will be used

Hello
we have a magento store with a lot of custom work done, we have customer that keep getting this error when adding to cart
SQLS...work done, we have customer that keep getting this error when adding to cart
SQLSTATE[23000]: Integrity constraint violation: 1452 Cannot add or update a child row: a foreign key constraint fails
we need this fixed

Hello, I have already a keynote presentation, this one is not complete and i would like to add pictures and at the end s small effect (if possible), it is not a big project but I am running out of time and I need some help.
Thanks

We would like to have an app that is to be marketed to businesses. The purpose of the app is to allow a person to open there app and see the name and a picture of any other person who also has the same app that is within a certain radius say 100 feet. It should work anywhere in or outside of the office. The app would automatically link to any other phone with the same app that is within the radiu...

...for experience developer who can help us implementing the JWT functionality using Azure Key and NOT Azure Secret.
Currently JWT functionality is working with Azure Secret and we need to replace Azure Secret with Azure Keys.
Developer who has real time Azure Key Vault and JWT experience need to apply.
This is a urgent requirement and developer should

Hello,
I am in a need of .NET Experts who can help my team to resolve some key challenges in our project.
Please contact only if you are a very experienced technical expert.
Thank you
Regards
Mrugesh Panchal

needed website on google first page with 5 key words- google uk, [iniciar sesión para ver URL] main target.
Please update how much time needed and its final long term work not one time job.
I will give bulk orders if first project remain good so keep in mind that your offer should be competitive and work should be excellent because if first project do not remain good

AWS Workplace setup with KMS key.
(just the key part and what to do with it is the question and answer to get me going)
wanted to see if you could help me with a shell script to connect a server into the puppet server or deploy an agent in a simpler step ?
Something possible to do now ?
Possible for $10?? Perhaps after this more work as I need

An algorithm that is virtually impossible to create a keygen even if the reverse engineerer deobfuscates the application. It should consist of a hardware hash that will still be compatible with the computer even if they change hardware (to an extent).
Need an example? [iniciar sesión para ver URL]

Hello. I'm looking for a instructor or someone who knows hyperledger fabric really well and is ready to answer my questions. Basically, I'm a developer myself but i have a hard time understanding it, i have questions which i need answers for. I'll pay you much if you prove that you know it really well and are ready to really help me out understand it.
If you're ready, please ...

Hi Freelancers,
The all I need is, I have a Java web app, developed in Java ...web app, developed in Java spring (i guess) And it is hosted in AWS, I can see on aws there is a .war file, The all you need to do is download that war file, and change that key that I have and deploy the same back to AWS.
It is should be 1 hour work for any java developer.